Geometry.Net - the online learning center
Home  - Basic_E - Electronic Evidence Criminal Investigation
e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-86 of 86    Back | 1  | 2  | 3  | 4  | 5 
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Electronic Evidence Criminal Investigation:     more detail
  1. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations by Computer Crime and Intellectual Property Section - Criminal Division, 2002
  2. Searching and seizing computers and obtaining electronic evidence in criminal investigations (SuDoc J 1.8/2:2001011797) by Orin S. Kerr, 2001
  3. Electronic crime scene investigation : a guide for first responders (SuDoc J 28.8/3:EL 1) by U.S. Dept of Justice, 2001
  4. Advances in Digital Forensics III (IFIP International Federation for Information Processing) (IFIP International Federation for Information Processing)
  5. Advances in Digital Forensics: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, ... Federation for Information Processing)
  6. Wiretaps by Anthony Alberti, 2002-01-30
  7. Voiceprint identification: Its forensic application by Fausto Poza, 1974
  8. The family lawyer by Will Bernard, 1966
  9. Seventh Circuit holds that Foreign Intelligence Surveillance Act permits use of wiretap evidence obtained in international investigation for domestic criminal ... An article from: International Law Update by Gale Reference Team, 2006-12-01
  10. Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors by Anthony Reyes, Richard Brittson, et all 2007-02-26
  11. Digital forensics in the twenty-first century.: An article from: The Forensic Examiner by Gavin W. Manes, 2007-12-22
  12. Search and Surveillance by Sybil Sharpe, De Montfort University, UK Sybil Sharpe, 2000-09

81. Patriot Act's Reach Has Gone Beyond Terrorism
to secure nationwide warrants to obtain email and electronic evidence has A senior official said investigators in the past two years had seized
http://www.scn.org/ccapa/pa-article.html

vs. Constitution
Details Relevant Article Contact Info ... Contact Info Patriot Act Article Welcome Patriot Act Back Patriot Act's Reach Has Gone Beyond Terrorism
Eric Lichtblau -The New York Times Washington DC - The Bush administration, which calls the USA Patriot Act perhaps its most essential tool in fighting terrorists, has begun using the law with increasing frequency in many criminal investigations that have little or no connection to terrorism. The government is using its expanded authority under the far-reaching law to investigate suspected drug traffickers, white-collar criminals, blackmailers, child pornographers, money launderers, spies and corrupt foreign leaders, federal officials said. Justice Department officials said they simply are using all the tools now available to them to pursue criminals, terrorists or otherwise. But critics of the administration's anti-terrorism tactics assert such use of the law is evidence the administration has sold the American public a false bill of goods, using terrorism as a guise to pursue a broader law-enforcement agenda. "Within six months of passing the Patriot Act, the Justice Department was conducting seminars on how to stretch the new wiretapping provisions to extend them beyond terror cases," Dan Dodson, a spokesman for the National Association of Criminal Defense Attorneys, told The Associated Press earlier this month. "They say they want the Patriot Act to fight terrorism, then, within six months, they are teaching their people how to use it on ordinary citizens."

82. DNA Lite, Printer Friendly Version
we unconsciously leave both physical and electronic evidence in our wake—by Nearly a quarter of a decade after investigators in Leicestershire,
http://www.zmag.org/ZMagSite/mar2003/quinnprint0303.html
Z Magazine Online Printer Friendly Version March 2003 Volume 16 Number 3
DNA Lite by Timothy Quinn back to article I PC Magazine revealed how a crafty tester used a color printer to create a photograph of a face familiar to the system, cut a nose hole to give the mask appropriate depth if an unflattering likeness, and achieved access as an apparently legitimate user. pro bono legal funds that utilize genetic evidence to defend the wrongly accused and indigent. Although forensic technologies will undoubtedly continue to assist in the conviction of actual felons, the rest of us will have to content ourselves with the tenuous protection of the First Amendment and the promise of a safer casino. Timothy Quinn is a writer and technology professional. He currently lives and works in New York City.

83. Vacancy HQ-IG-98-08 Opens 01/27/98 Closes 02/10/98 Criminal
sufficient forensics data recovery at crime scenes and media analysis of seizedelectronic evidence as litigation support of criminal investigations. 6.
http://www.hq.nasa.gov/office/oig/hq/recruitment/1998/98-08.txt
Vacancy: HQ-IG-98-08 Opens: 01/27/98 Closes: 02/10/98 Criminal Investigator, GS-1811-12/13 Office of Inspector General Washington, DC Duty Station: Jet Propulsion Laboratory, Pasadena, CA All Sources Promotion Potential: GS-13 Permanent Change of Station (PCS) costs will be paid Serves as a Criminal Investigator and/or Team Leader and is responsible for a wide variety of investigative assignments involving criminal conduct. Plans, coordinates and conducts criminal investigations and forensic data recovery activities of intrusions into EDP, telecommunications, Internet and other network systems. Devises and implements novel techniques of detecting, retrieving and analyzing evidence of intrusions into NASA EDP systems. Provides support and guidance to other OIG criminal investigators concerning computer crimes and forensic data recovery. Conducts investigations into alleged fraud and violations of numerous Federal statutes affecting NASA employees or programs, contracts, contractors, and contractor employees; criminal statutes relating to the falsification of contractor's certified payrolls; and fraudulent deviation from or failure to comply with NASA contract specifications. Presents investigative results both orally and in report form for determination of prosecutive merit. Maintains liaison with members of Federal, State, and local law enforcement agencies. Performs other related duties. CONDITIONS OF EMPLOYMENT: Incumbent must be willing to travel and relocate as necessary. Candidates appointed to professional positions in the Office of Inspector General are expected to be willing to travel, be mobile, and may be reassigned to different duty locations throughout the U.S. dependent upon Office of Inspector General program needs. This position has been designated Special Sensitive. The selectee will be subject to preappointment security investigation. This position is subject to Civil Service Retirement deductions for Law Enforcement Officers (5 U.S.C. 8336(c)(1) or 5 U.S.C. 8412(d)). SPECIAL NOTE: The maximum age for original entry into positions covered under the special law enforcement provision 5 U.S.C. 3307(d) is 35 years. The selectee must be able to meet the medical standards of the position and pass a pre-employment physical. This is a Testing Designated Position (TDP) and selectee will be subject to required drug testing. DUAL CONSIDERATION: All status candidates who wish to be considered under both merit promotion and competitive procedures must submit two (2) complete applications. When only one (1) application is received, it will be considered for the merit promotion announcement only. GULF WAR/BOSNIA SERVICE: The Defense Authorization Act of November 18, 1997, extended veterans' preference to persons who served on active duty during the Gulf War from August 2, 1990, through January 2, 1992. The law grants preference to persons otherwise eligible and who served on active duty during this period regardless of where the person served or for how long. The law also authorized the Secretary of each military department to award the Armed Forces Expeditionary Medal for service in Bosnia during the period November 20, 1995, to a date to be determined. The award of the Medal is qualifying for veterans' preference. More information on veterans' preference is available in the Vets Guide that may be found on the Internet at www.opm.gov. BASIS OF RATING: Applicants will be rated on knowledge, skills, abilities, and other characteristics and supervisory appraisals, and potential as evidenced by supervisory assessment of potential, awards, and self development efforts. FOR GS-12 LEVEL: 1. Knowledge of principles, theories, and practices of criminal investigation including Federal statutes, regulations, techniques, criminal procedures, and rules of evidence. 2. Ability to plan, coordinate, and conduct criminal investigations of intrusions into EDP, telecommunications, Internet or other network systems (including ability to devise novel automated approaches and solutions to investigative challenges). 3. Ability to communicate effectively orally and in writing. 4. Knowledge of the concepts and theory of computer and telecommunications hardware and software systems including fluency in working with PBX/CBX operating systems software, and popular computer programming and scripting languages. 5. Ability to plan, coordinate and conduct legally sufficient forensics data recovery at crime scenes and media analysis of seized electronic evidence as litigation support of criminal investigations. 6. Knowledge of UNIX/LINUX operating systems. FOR GS-13 LEVEL: 1. Demonstrated knowledge of principles, theories and practices of criminal investigation including Federal statutes, regulations, techniques, criminal procedures, and rules of evidence. 2. Demonstrated ability to plan, coordinate, and conduct criminal investigations of intrusion (including ability to devise novel automated approaches and solutions to investigative challenges) into EDP, telecommunications, Internet, or other network systems. 3. Ability to communicate effectively orally and in writing. 4. Demonstrated ability to use EDP capabilities (including fluency with PBX/CBX operating systems software, and popular computer programming and scripting languages) as a tool to analyze and evaluate investigative evidence and to conduct intrusion investigations. 5. Demonstrated ability to plan, coordinate and conduct legally sufficient forensics data recovery at crime scenes and media analysis of seized electronic evidence as litigation support of criminal investigations. 6. Fluency in the use of UNIX/LINUX operating systems.

84. IPC - IPC Submission To Minister Of Justice And Attorney General Of Canada On 20
While police must not be denied the power to pursue electronic evidence of other less intrusive investigative methods are likely to prove impracticable,
http://www.ipc.on.ca/scripts/index_.asp?action=31&P_ID=16087&N_ID=1&PT_ID=11457&

85. The Electronic Discovery Library
Searching and Seizing Computers and Obtaining electronic evidence in CriminalInvestigations US Department of Justice (July 2002)
http://www.sbot.org/discovery_library.htm

Electronic Discovery
and Computer Forensics Collection Studies indicate that a third of business documents created today never become paper records. When you consider the explosion in e-mail and other electronic communication, it's likely that most smoking gun documents never get printed out. Discovery of electronic records raises daunting issues of cost, complexity, privacy and privilege, but that's where the evidence in all cases is rapidly and inexorably moving. Computer forensics is the identification, preservation, extraction, interpretation and presentation of computer-related evidence. With an estimated 93% of the world's data being created by computer, computer forensics and related issues offers signal challenges and opportunities to the 21st century law practice. Examplar Order Requiring Imaging of Hard Drive
Hon. Curt B. Henderson (March 2003)
D raft of an order directing the imaging and preservation of the data on a computer hard drive; the discoverability of the material is reserved for later determination

86. Criminal Law Division
The general rule in Pennsylvania is that electronic surveillance is illegal. For criminal investigative purposes, an investigative or law enforcement
http://www.attorneygeneral.gov/cld/articles/wire.cfm

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 5     81-86 of 86    Back | 1  | 2  | 3  | 4  | 5 

free hit counter